diff --git a/apps/encryption/appinfo/encryption.php b/apps/encryption/appinfo/encryption.php index a389abe5da..d97aa07738 100644 --- a/apps/encryption/appinfo/encryption.php +++ b/apps/encryption/appinfo/encryption.php @@ -85,7 +85,7 @@ class Encryption extends \OCP\AppFramework\App { $container->query('UserSetup'), $server->getUserSession(), new \OCP\Util(), - $container->query('Util'),), + $container->query('Util')), ]); $hookManager->fireHooks(); diff --git a/apps/encryption/settings/settings-admin.php b/apps/encryption/settings/settings-admin.php index a32359bdfa..813956aa0a 100644 --- a/apps/encryption/settings/settings-admin.php +++ b/apps/encryption/settings/settings-admin.php @@ -10,7 +10,7 @@ use OCA\Encryption\KeyManager; \OC_Util::checkAdminUser(); -$tmpl = new OCP\Template('files_encryption', 'settings-admin'); +$tmpl = new OCP\Template('encryption', 'settings-admin'); // Check if an adminRecovery account is enabled for recovering files after lost pwd $recoveryAdminEnabled = \OC::$server->getConfig()->getAppValue('encryption', 'recoveryAdminEnabled', '0'); diff --git a/apps/encryption/templates/invalid_private_key.php b/apps/encryption/templates/invalid_private_key.php new file mode 100644 index 0000000000..b148e65b19 --- /dev/null +++ b/apps/encryption/templates/invalid_private_key.php @@ -0,0 +1,12 @@ +